MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER
|
|
- Allan McDaniel
- 8 years ago
- Views:
Transcription
1 MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER Alireza Nemaney Pour 1, Raheleh Kholghi 2 and Soheil Behnam Roudsari 2 1 Dept. of Software Technology Engineering, Islamic Azad University of Abhar, Iran pour@abhariau.ac.ir 2 Dept. of IT Engineering, Sharif University of Technology, Kish Island, Iran {r.kholghi,soheil.bh}@gmail.com ABSTRACT Unsolicited Bulk s (also known as Spam) are undesirable s sent to massive number of users. Spam s consume the network resources and cause lots of security uncertainties. As we studied, the location where the spam filter operates in is an important parameter to preserve network resources. Although there are many different methods to block spam s, most of program developers only intend to block spam s from being delivered to their clients. In this paper, we will introduce a new and efficient approach to prevent spam s from being transferred. The result shows that if we focus on developing a filtering method for spams s in the sender mail server rather than the receiver mail server, we can detect the spam s in the shortest time consequently to avoid wasting network resources. KEYWORDS Anti-spams, Receiver mail server, Sender mail server, Spam 1. INTRODUCTION An is considered spam when a massive number of them are sent to multiple recipients. Spam is usually used for advertisement or marketing. These unwanted s cause drawbacks to the recipient, and consume the users network resources. The disadvantages of spam s have been addressed in many occasions. In some cases for a single user 9 out of 10 s are spams that fill his/her inbox. The United States Federal Trade Commission described that 66% of spams have false information somewhere in the message and 18% of spams advertise Adult material. According to another report [1] 12% of users spend half hour or more per day dealing with spam s. There are several major problems with spam mails. First of all, they are high in volume and fill in mailbox of users. Secondly, there is no correlation between receivers area of interests and the contents of spam mails. Thirdly, they cost money for ISPs because the bandwidth and the memory of system are wasted. Finally, Spam s cause a lot of security problems because most of them include Trojan, Malwares, and viruses [2]. Many filtering techniques have been developed to control the flow of spam s. Unfortunately, even with these available techniques, the number of spam s is growing and the flow has not been controlled completely. The setback is that there is no actual solution because a spammer; an unidentified user with enough knowledge is able to be familiar with the logic of the filtering mechanisms. As a result, bypassing the filter and sending the spam s DOI : /ijnsa
2 seems not to be a difficult task for such spammers. In such cases, the spam s are not detected and are considered as legitimate ones. There are studies regarding spam filtering [3-11]. The common issue with the usage of all of these techniques is that the filtering systems are set up in the receiver mail server, consequently, causing network load and wasting network resources. To preserve network resources such as bandwidth and memory, and to reduce network load, this paper proposes to locate spam filtering in the sender mail server rather than the receiver mail server. Moreover, this paper by experimental results shows that this novel approach works more efficiently compared with the previously proposed approaches. This paper is organized as follows. In section 2, the related work to the subject will be highlighted. The Overview of system and its operation are described in section 3. Our proposal and the experiment results are presented in section 4 and 5 respectively. Finally, the conclusion is shown in section RELATED WORK As stated before, there are many filtering techniques to stop the flow of spam s to mail boxes [3-12]. Figure 1 simply illustrates the classification of spam filtering techniques. The classification includes list-based filtering [3-7], static algorithm [8-10], and IP-based filtering [11]. The list-based filtering is classified into three categories; Blacklist [3], Whitelist [4, 5], and Greylist [6, 7]. Static algorithm is classified into content-based [8, 9], and the rulebased [10] filtering. Finally, IP-based filtering consists of revers-lookup [11]. In the Blacklist filtering [3], the IP address and the domain name of the sender server is stored in a list called Blacklist and the s from that IP address and domain are blocked. Then, based on the policy of the receiver side, the s from the Blacklisted IP addresses are deleted or sent to spam folder. Conversely, there are some limitations for the Blacklist filtering. First, since the spammer uses several IP addresses with a variety of domain names, updating these lists is a difficult task for the client. Consequently, updating the Blacklist regularly is costly. Second, Blacklist filtering may result in identification of an as false negative because of minimal control in this methodology. On the other side of the Blacklist, is the Whitelist filtering [4, 5]. In this technique, any user stores his/her contacts in a list called the Whitelist. Therefore, any received with the correspondent address from this list is accepted, and all other addresses out of this list are considered uncertain. In this technique, also there are certain obstacles. The obvious one is that, since the sender is unidentified and unpredictable, it is difficult to insert all possible sender addresses in this list. Similar to the Blacklist, the Whitelist filtering needs to be updated regularly; which is a costly task for the user. Another major issue is that if the address of a spammer is added in the Whitelist of an client once, this will provide access to all of the addresses in the Whitelist of that specific client without any boundaries or limits. As a result, this will ensure the spammer more reachable addresses. In Greylist filtering [6], a different approach is practiced. This technique can be set either on the mail server of the receiver or/and on the personal receiver anti-spam application. At first step, all received s are rejected. Because of this policy, spammers do not try to resend the rejected since it is time consuming for them. Instead, the spammers prefer to search for another address without Greylist filtering. Moreover, from the behavior of spammer viewpoint, the Greylist by itself provides a usable contact list of the mail servers using this filtering technique, subsequently; the spammer avoids sending more messages to those servers after the first rejection because spammer can recognize what the receiver mail server filtering structure is, and how it operates. Consequently, the spammer will update his techniques in order to bypass Greylist filtering. Finally, a major weakness observed in this technique is that there is 54
3 Figure. 1 Classification of Spam Detection Methods a possibility that legitimate messages may be lost [6, 7]. Content-based filtering [8, 9] is another filtering technique that uses machine learning criteria. In order to have the satisfactory results, the administrator of the mail server needs to train the filters to perform their functions. This filtering starts to work based on some predefined words after the is received entirely. These particular words are collected by statistical reports based on the words and phrases gathered from the spam s. Rule based filtering [10] is similar to content-based one with some differences. This technique works through some certain rules and regulations. By these rules the filter decides to pass or to block the received . The major problem with the content and rule based filtering is that, the rules and the words are verified by the programmer. This leads to variable restrictions. First, the databases and the policies need to be updated at regular basis. Second, as all spammers are aware of these filters, and their functionality, they will try to deliver their messages using additional characters to legitimize their s. Finally, these techniques work after the body of the is completely received by the mail server which increases the time for checking whether the message is spam or not. In reverse lookup, also known as a reverse DNS (Domain Name System) lookup, the host is associated with a given IP (Internet Protocol) address. By using this routine, the receiver can confirm the identity of the domain name of the sender. This technique is not effective for the mobile users and the users with invalid IP address [11]. Authors in [12] introduce a new procedure based on the spammer behavior. Commonly, a spammer sends an (s) to huge number of users. In this filtering, the administrator sets a counter on mail server to limit the number of the s which its clients wish to send. This counter-based filtering provides time saving because the mail server can decide whether a mail is spam or not before the message is completely received. But its restriction is that the legitimate s may not pass the counter filter. As spammers become more dominant, the number of anti-spam methodologies and software are growing correspondingly. The problem is that even with the most accurate anti-spam techniques, we lose lots of network resources such as time and bandwidth because these techniques are set on the receiver server side. In most of web based services such as Hotmail, AOL, and Yahoo, filtering s start after they are fully received by the receiver mail servers. In this paper we propose shifting the location of the filtering system from the receive mail server to the sender mail server to achieve efficient results. For this purpose, we define four scenarios and evaluate the results with two anti-spam software, DSPAM 1, and TREC 2. These software systems are open source programs, and include all filtering techniques stated above. 1 DSPAM: 2 TREC: Text REtrieval Conference. 55
4 Figure. 2 SMTP Transaction Commands 3. OVERVIEW OF SYSTEM In this section, a brief explanation of protocol and the process of filtering will be elaborated. Simple Mail Transfer Protocol (SMTP) is the first protocol which transfers the s by some commands. Figure 2 illustrates SMTP commands. First, TCP/IP (Transmission Control protocol and Internet Protocol) connection starts between sender and the associated mail server. Following that, the SMTP commands begin with a Hello message and announcing the acceptance of the session between the client and the server. This process ends when the message is accepted by the mail server. TCP connection disconnects if there is no more message from the client to the mail server. 3. OVERVIEW OF SYSTEM In this section, a brief explanation of protocol and the process of filtering will be elaborated. Simple Mail Transfer Protocol (SMTP) is the first protocol which transfers the s by some commands. Figure 2 illustrates SMTP commands. First, TCP/IP (Transmission Control protocol and Internet Protocol) connection starts between sender and the associated mail server. Following that, the SMTP commands begin with a Hello message and announcing the acceptance of the session between the client and the server. This process ends when the message is accepted by the mail server. TCP connection disconnects if there is no more message from the client to the mail server. When the is delivered by the server, the filtering phase is started. Based on the server filtering policy, Blacklist and Whitelist filtering is stared to examine if the is a spam or a valid one. If the is recognized as a valid one, it is sent to receiver s inbox otherwise the is blocked or transferred to the spam folder. When a Greylist filtering is used in relevant 56
5 mail server, the is rejected for the first time. Afterward the body of the is tested with content-based and rule-based filters according to the standards of the administrator. 4. STRUCTURE OF OUR PROPOSAL This section describes our proposal. The main purpose of this approach is to detect spam s in 1 the shortest time and consequently to avoid wasting network resources by shifting the location of the filtering system from the receiver mail server to sender mail server (Figure 3). In this 2 way, all s are screened and checked before being permitted to proceed to the receiver mail server. Figure 4 illustrates the structure of sending an with necessary filtering steps. The procedure consists of four steps, IP validity check for sender and receiver, list-based filtering, and statistical algorithm. 3 First, the validity of IP address of the sender is checked by its mail server. When the client is invalid, the connection is terminated. Otherwise, the mail is preceded to next step. 4 Second, the validity of the address of the receiver is checked by the DNS server. When the address of the receiver is not available, or wrong, the mail server sends 5 back a failure message to the sender, and the connection is terminated. Otherwise, the mail is preceded to list-based filtering. Third, the should be checked by the list-based filtering such as Whitelist, Blacklist, and Greylist. By passing these filtering the is preceded to next step. When an cannot pass one of these filtering, the connection is terminated. Forth, the statistical filtering such as, content-base and rule-based filtering is started. s that cannot be verified as valid ones are not sent. Finally, the valid s are sent to the receiver mail server. Figure. 3 Shifting the location of filtering system to sender mail server 57
6 Figure. 4 An algorithm of filtering in sender mail server Our proposal is a new approach to prevent spam s. Its novelty is that we introduce the filtering methods in the sender mail server rather than the receiver mail server. By this approach, invalid s are not transferred to the receiver mail server because of filtering in the sender mail server. Consequently, the network resources, such as bandwidth, time, and memory is preserved. In the next section, we will illustrate the efficiency of this approach by fortifying it with experimental results. 5. EXPERIMENT RESULTS This section describes experiment results. We analyse our proposed model and compare the performance of filtering system when is set up on different locations. Figure 5 illustrates the observation model assuming that the spammer is going to send s through the mail server A. Four scenarios are defined based on changing the location of filtering system as follows: (1) The spammer is going to send s through the mail server A to the mail server B, and B checks the s (Figure 5 scenario 1). (2) The spammer is going to send s through the mail server A to different mail servers such as B, C, D, and they check the received s respectively (Figure 5 scenario 2) (3) The spammer is going to send s through the mail server A to mail server B, and A checks the s (Figure 5 scenario 3). (4) The spammer is going to send s through the mail server A to different mail servers such as B, C, D, and the mail server A checks the s (Figure 5 scenario 4). 58
7 Scenario 1: Mail server B checks s Scenario2. Mail servers B, C, D, checks s respectively. Scenario3. Mail server A checks s being sent to mail server B Scenario4. Mail server A checks s being sent to the mail servers B, C, D Figure. 5 Observation model assuming that the spammer sends s through the mail server A For our experiment, we used the results that concluded from various sources [13]. Figure 6 illustrates the result of the performance of anti-spam software running on different ISPs compared with two representative open source anti-spams software. This Figure shows the time required to process s in the receiver mail server. The required time to process s at ISPs such as Hotmail, AOL and Microsoft are, 0.1, 0.09, and 0.1 second respectively. On the other hand, the results of our experiment with two representative anti-spam software such as TREC and DSPAM shows that the required time to process s are 200 and 250 seconds. This result shows that the performance of filtering in ISPs is better compared with open source software. The factors that directly affect the performance of filtering discrepancies are based on the size of , processor power, and several others. Later, we will use the outcomes of this experimentation for the four scenarios explained above. As experimental results illustrated in Figure 7, we fulfilled our four scenarios. Starting from scenario 1, the mail server B checks all s one by one. For this purpose, the mail server B puts each single in its specific memory based on each IP address in the . As a result, the server consumes more time for the same . The result of this scenario for each anti-spam system is shown with the rightmost bar in Figure 7. 59
8 Figure. 6 The performance comparison of filtering between ISPs and open source software in receiver mail server In scenario 2 the receiver mail servers, B, C and D check all the received s. In order to send each , the mail server A is required to establish a session with associate mail servers. For this purpose, the receiver mail servers, B, C, and D should accept the sessions for each IP address. The result of this scenario is similar to the first scenario because we consider the total process time for scenario 2. Results of this scenario are shown with blue bar in Figure 7. In the third scenario the spam filtering is performed in the sender mail server. When the spammer attempts to send s to different clients, the anti-spam software starts to process filtering on the just once. If the is recognized as trustable , it is sent to B. Otherwise this will be deleted. The advantage of filtering in the sender mail server is that the network resources between the servers are preserved. The results are displayed with green bars in Figure 7. In the last scenario, the sender sends s to several recipients on different mail servers Time (sec) Hotmail AOL Microsoft TREC DSPAM scenario 4 scenario 3 scenario 2 scenario 1 Figure. 7 The performance comparison of spam mail filtering between sender and receiver mail servers. 60
9 This time the mail server A should check the s. Before any action for filtering, the mail server A needs to establish sessions with the other mail servers. For this reason, the process time is longer than the time required in scenario 3. The anti-spam processing in the sender mail server uses less time when compared the same procedure performed on the receiver mail server. Results are demonstrated with red bars. The outcome of these assessments, as shown in Figure. 7, imply that scenarios 3 and 4 have better performance compared with scenarios 1 and 2 under all conditions. It is because the filtering process is performed in the sender mail server. Moreover, the performance of scenario 4 is not satisfactory compared with scenario 3 because the sender mail server needs to check the domain of each receiver mail server. In this case, the performance level falls, however still it is considerably better than the cases where the filtering is checked in the receiver mail server (scenarios 1 and 2). Although the results for TREC and DSPAM are based on our experiments, the results for ISPs such as Hotmail, AOL and Microsoft have been calculated logically based on our prediction extracted from Figure. 6. On the other hand, scenario 3 indicates that when the filtering system is located in the sender mail server, the processed time becomes n times less than the time when the filtering system is in the receiver mail server when n indicates the number of processed s. Spam mail detection is a challenging work against human mind because spammers try to find new ways to bypass filtering systems. Therefore, it seems that it is a difficult task to read the spammers mind and to find all the possible tricks that they might develop. To overcome this problem, we suggest developing methods to provide high performance in the shortest time. Spam mail filtering in the sender mail server (our proposal) is one of those methods compared with the filtering in the receiver mail server. 6. CONCLUSION In this paper, we have proposed an efficient approach for spam detection. Our approach proposes to shift the location of spam filtering system from receiver mail server to sender mail server. The purpose of this novel idea is to detect spam s in the shortest time and consequently to prevent wasting the network resources from misusage of spammers. In addition, by experimental results we proved that our idea is efficient because just the resources in the sender side are accessed. This implies that if an is identified as spam one, the receiver s bandwidth and memory is preserved which will assure a better performance. Finally, by locating the filtering system in the sender mail server; the processed time becomes n times less than the time when the filtering system is in the receiver mail server when n indicates the number of processed s. REFERENCES [1] C. MacFarlane, (2003), FTC Measures False Claims Inherent in Random Spam, Federal Trade Commission, Accessed Jul. 20, [2] L. Nosrati & A. Nemaney Pour, Dynamic Concept Drift Detection for Spam Filtering, Proceedings of ACEEE 2nd International Conference on Advances Information and Communication Technologies (ICT 2011), Amsterdam, Netherlands, pp , Dec [3] A. Ramachandran, D. Dagon & N. Feamster, Can DNS-Based Blacklists Keep Up with Bots?, The Third Conference on and Anti-Spam (CEAS 2006), California, USA, pp.1-2, Jul [4] J. Goodman, Spam: Technologies and Policies, White Paper, Microsoft research, pp.1-19, Feb
10 [5] A.Ramachandran & N. Feamster, Understanding the Network-Level Behavior of Spammers, Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2006), Pisa, Italy, pp , Sep [6] E. Harris, (2003), Greylisting: The Next Step in the Spam Control War, White Paper, Accessed Dec. 20, [7] J.R. Levine, Experience with Greylisting, Proceedings of Second Conference on and Anti- Spam (CEAS 2005), CA, USA, pp. 1-2, Jul [8] P. Graham, Better Bayesian filtering, MIT Spam Conference, Jun [9] H. Yin & Z. Chaoyang, An Improved Bayesian Algorithm for Filtering Spam , IEEE 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC 2011), Huangzhou, China, pp , Oct [10] A. Ciltik & T. Gungor, (2008), Time-efficient spam filtering using n-gram models, Elsevier, Pattern Recognition Letters, Vol. 29, No. 1, pp [11] B. Agrawal, N. Kumar & M. Molle, Controlling Spam at the Routers, Proceedings of the IEEE International Conference on Communications (ICC 2005), Seoul, Korea, pp , May [12] R. Kholghi, S. Behnam Roudsari & A. Nemaney Pour, An Efficient Spam Mail Detection by Counter Technique, Proceedings of International Conference on Computer Science and Information Technology (ICCSIT 2011), Penang, Malaysia, pp , Feb [13] Y. Luo, (2010), Workload characterization of spam filtering systems, International Journal of Network Security & Its Application (IJNSA), Vol. 2, No. 1, pp Authors Alireza Nemaney Pour 1 has obtained his B.S degree in Computer Science from Sanno University, Japan, M.S in Computer Science from Japan Advanced Institute of Science And Technology, Japan, and Ph.D. degree in Information Network Science from Graduate School of Information Systems, the University of Electro-Communications, Japan. He is currently a faculty member of Islamic Azad University of Abhar in Iran. In addition, He is a technical advisor of J-Tech Corporation in Japan. His research interests include Network Security, Group Communication Security, Protocol Security, Information Leakage, Spam Mail Prevention, Web Spam Detection, and Cryptography. Raheleh Kholghi 2 has received her B.Sc. from Azad University in software engineering and M.Sc. degree in Information Technology Engineering from Sharif University of Technology, International Campus, Iran in She works currently in Telecommunication Kish Company (TKC) as an IT engineer. Her research area is about network and its application security. Soheil Behnam Roudsari 2 has received his B.Sc. in Information Technology Engineering from Sharif University of Technology, International Campus, Iran. He is currently a M.Sc. student in Engineering of Computer Systems, Politecnico Di Milano University, Italy. His area of research interest is Network Security. 62
Software Engineering 4C03 SPAM
Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as
More informationOIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010
OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)
More informationSavita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
More informationeprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
More informationAbout this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
More informationescan Anti-Spam White Paper
escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe
More informationAn Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
More informationA Monitor Tool for Anti-spam Mechanisms and Spammers Behavior
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,
More informationSpam Filtering Methods for Email Filtering
Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: akshaygulhane91@gmail.com Sakshi Gudadhe Third year B.E. (CSE) E-mail: gudadhe.sakshi25@gmail.com Shraddha A.
More informationCOAT : Collaborative Outgoing Anti-Spam Technique
COAT : Collaborative Outgoing Anti-Spam Technique Adnan Ahmad and Brian Whitworth Institute of Information and Mathematical Sciences Massey University, Auckland, New Zealand [Aahmad, B.Whitworth]@massey.ac.nz
More informationSpam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
More informationAntispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
More informationA Survey on Spam Filtering for Online Social Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationOUTLOOK SPAM TUTORIAL
OUTLOOK SPAM TUTORIAL You can find this at http://www.sitedeveloper.ws/tutorials/spam.htm. Look for the yellow highlighting and red text in this article below to know where to add the EXODUSNetwork domain
More information6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
More informationAnalysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
More informationGroundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam
Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques
More informationESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
More informationEvaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response
Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response Abstract Manabu IWANAGA, Toshihiro TABATA, and Kouichi SAKURAI Kyushu University Graduate School of Information
More informationDealing with spam mail
Vodafone Hosted Services Dealing with spam mail User guide Welcome. This guide will help you to set up anti-spam measures on your email accounts and domains. The main principle behind dealing with spam
More informationBARRACUDA. N e t w o r k s SPAM FIREWALL 600
BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine
More informationSPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
More informationAn In-depth Analysis of Spam and Spammers
An In-depth Analysis of Spam and Spammers Dhinaharan Nagamalai Wireilla Net Solutions Inc,Chennai,India Beatrice Cynthia Dhinakaran, Jae Kwang Lee Department of Computer Engineering, Hannam University,
More informationEmail Getting Started Guide Unix Platform
Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses
More informationSURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
More informationHow to Add HealthCentral to Your Safe Senders List
How to Add HealthCentral to Your Safe Senders List Due to the growing problem of unsolicited and unwanted commercial emails, many web mail services and email applications have taken measures to automatically
More informationK7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
More informationAntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
More informationPurchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
More informationAnti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
More informationWhy Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
More informationGood Practice use of Outlook, Thunderbird and HORDE Webmail
Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail mdisupport@midwestdatainc.com.
More informationSpam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10
Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk
More informationIntercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
More informationLan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,
More informationAchieve more with less
Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering
More informationSome fitting of naive Bayesian spam filtering for Japanese environment
Some fitting of naive Bayesian spam filtering for Japanese environment Manabu Iwanaga 1, Toshihiro Tabata 2, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, Kyushu
More informationSinglefin. e-mail protection services. Spam Filtering. Building a More Accurate Filter @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ By Lawrence Didsbury, MCSE, MASE
Singlefin e-mail protection services Spam Filtering Building a More Accurate Filter @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ By Lawrence Didsbury, MCSE, MASE Executive Summary Every day when your employees
More informationEmail Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
More informationSolutions IT Ltd Virus and Antispam filtering solutions 01324 877183 Info@solutions-it.co.uk
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
More informationThrottling Outgoing SPAM for Webmail Services
2012 2nd International Conference on Industrial Technology and Management (ICITM 2012) IPCSIT vol. 49 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V49.5 5 Throttling Outgoing SPAM for
More informationWhite Paper X-Spam for Exchange 2000-2003 Server
White Paper X-Spam for Exchange 2000-2003 Server X-Spam for Exchange 2000-2003 (X-Spam) is a highly adaptive Anti-Spam Software that protects the Microsoft Exchange 2000-2003 servers from Spam. X-Spam
More informationA Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
More informationHow To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
More informationAnti-Spam Methodologies: A Comparative Study
Anti-Spam Methodologies: A Comparative Study Saima Hasib, Mahak Motwani, Amit Saxena Truba Institute of Engineering and Information Technology Bhopal (M.P),India Abstract: E-mail is an essential communication
More informationAN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, APRIL 212, VOLUME: 2, ISSUE: 3 AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM S. Arun Mozhi Selvi 1 and R.S. Rajesh 2 1 Department
More informationHow To Make Sure You Receive New Penn Emails
3 rd PARTY ORIG I N ATIONS How To Make Sure You Receive New Penn Emails Why Do New Penn Emails Not Reach My Inbox? Depending on the email system you use to check email and the spam filter software it s
More informationE-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
More informationGovernment of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
More informationHosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
More informationObjective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
More informationEmail Spam Detection A Machine Learning Approach
Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn
More informationMDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
More informationSecurepoint Security Systems
HowTo: Configuration of the spam filter Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration of the spam filter with the Securepoint Security Manager... 3 2 Spam filter configuration
More informationArticles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
More informationBULLGUARD SPAMFILTER
BULLGUARD SPAMFILTER GUIDE Introduction 1.1 Spam emails annoyance and security risk If you are a user of web-based email addresses, then you probably do not need antispam protection as that is already
More informationTowards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters
Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters Tarek Hassan (B.Sc. Computer Science, Egypt) This thesis is presented for the degree of Master of Computer Science Murdoch University,
More informationHow to keep spam off your network
GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam
More informationXGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
More informationAnglia IT Solutions Managed Anti-SPAM
By Appointment to Her Majesty The Queen Supplier of IT Products and Support Anglia IT Solutions Limited Swaffham Anglia IT Solutions Managed Anti-SPAM A Simple Guide All Rights Reserved. This document
More informationeprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
More informationComprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
More informationHow To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
More informationQuarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
More informationThe Role of Country-based email Filtering In Spam Reduction
The Role of Country-based email Filtering In Spam Reduction Using Country-of-Origin Technique to Counter Spam email By Updated November 1, 2007 Executive Summary The relocation of spamming mail servers,
More informationEXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER
EXPLANATION OF COMMON SPAM FILTERING TECHNIQUES WHITEPAPER Every year, the amount of unsolicited email received by the average email user increases dramatically. According to IDC, spam has accounted for
More informationCZECH UNIVERSITY OF LIFE SCIENCES PRAGUE. Faculty of Economics and Management. Informatics. Department of Information Technologies
CZECH UNIVERSITY OF LIFE SCIENCES PRAGUE Faculty of Economics and Management Informatics Department of Information Technologies Diploma Thesis Abstract SPAM FILTERING Author: Bc. Kateřina Selingerová Supervisor:
More informationhttp://connectwise.reflexion.net/login?domain=connectwise.net
ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.
More informationWhat is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
More informationBlackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
More informationAn Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
More informationSCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
More informationSender Identity and Reputation Management
Dec 4 th 2008 IT IS 3100 Sender Identity and Reputation Management Guest Lecture by: Gautam Singaraju College of Information Technology University i of North Carolina at Charlotte Accountability on the
More informationPanda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
More informationEnhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
More informationBayesian Learning Email Cleansing. In its original meaning, spam was associated with a canned meat from
Bayesian Learning Email Cleansing. In its original meaning, spam was associated with a canned meat from Hormel. In recent years its meaning has changed. Now, an obscure word has become synonymous with
More informationQuick Start Policy Patrol Spam Filter 5
Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
More informationThe basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
More informationSt. Bernard Managed Protection Services. White Paper. Spam Filtering Building a More Accurate Filter. By Lawrence Didsbury, MCSE, MASE
St. Bernard Managed Protection Services By Lawrence Didsbury, MCSE, MASE Executive Summary Spam issues and volume have been escalating in severity for many years. It is one of the key productivity, security
More informationTechnical Information www.jovian.ca
Technical Information www.jovian.ca Europa is a fully integrated Anti Spam & Email Appliance that offers 4 feature rich Services: > Anti Spam / Anti Virus > Email Redundancy > Email Service > Personalized
More informationCelframe - Easy Linux - Lesson 8 - Email Server
- Easy Linux - Lesson 8 - Email Server October 2007 Contents 1 Summary 2 2 Theoretical presentation 2 2.1 Introduction............................... 2 2.2 SMTP................................... 2 2.3
More informationWho will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. (pranaya.enugulapally@tcs.com) Abstract Spam is abuse
More informationGuardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
More informationHow to Use Red Condor Spam Filtering
What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies
More informationQuick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
More informationAnti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
More informationIP Addresses in Email Clients
IP Addresses in Email Clients Joshua Goodman 1 Microsoft Research, Redmond, WA 98052 Abstract. IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing
More informationNovel Mechanism to Defend DDoS Attacks Caused by Spam
Novel Mechanism to Defend DDoS Attacks Caused by Spam Dhinaharan Nagamalai Wireilla Net Solutions Inc, Chennai, India Cynthia Dhinakaran and Jae Kwang Lee Department of Computer Engineering, Hannam University,
More informationContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationSender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan
More informationAntispam Evaluation Guide. White Paper
Antispam Evaluation Guide White Paper Table of Contents 1 Testing antispam products within an organization: 10 steps...3 2 What is spam?...4 3 What is a detection rate?...4 4 What is a false positive rate?...4
More informationCloud Email Firewall. 1. Introduction. a. What is Spam?
Cloud Email Firewall 1. Introduction a. What is Spam? Spam are messages which are unsolicited or sent from unknown senders. Usually they are sent in large quantities (even massive) and with commercial
More informationDeliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
More informationMicrosoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
More informationImplementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
More informationEiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
More informationEmail Marketing Do s and Don ts A Sprint Mail Whitepaper
Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations
More informationHPL Barracuda Spam/Virus Firewall
HPL Barracuda Spam/Virus Firewall The Barracuda Spam/Virus Firewall has been deployed behind the HPL Campus Firewall. Its mission is to scan incoming and outgoing mail for known spam and viruses in the
More informationA Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
More information